[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-479 Dumps with VCE and PDF 81-90

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-479
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 81 – (Topic 2)

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

  1. Service account passwords in plain text

  2. Cached password hashes for the past 20 users

  3. IAS account names and passwords

  4. Local store PKI Kerberos certificates

Answer: A

Question No: 82 – (Topic 2)

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

  1. Open

  2. Stealth

  3. Closed

  4. Filtered

Answer: A

Question No: 83 – (Topic 2)

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

  1. %systemroot%\system32\drivers\etc

  2. %systemroot%\repair

  3. %systemroot%\LSA

  4. %systemroot%\system32\LSA

Answer: B

Question No: 84 – (Topic 2)

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company#39;s network. How would you answer?

  1. IBM Methodology

  2. LPT Methodology

  3. Google Methodology

  4. Microsoft Methodology

Answer: B

Question No: 85 – (Topic 2)

What will the following URL produce in an unpatched IIS Web Server? http://www.thetargetsite.com/scripts/..%co../..%co../windows/system32/cmd.exe?/c

dir c:\

  1. Execute a buffer flow in the C: drive of the web server

  2. Insert a Trojan horse into the C: drive of the web server

  3. Directory listing of the C:\windows\system32 folder on the web server

  4. Directory listing of C: drive on the web server

Answer: D

Question No: 86 – (Topic 2)

You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls (Select 2)

A. 162

B. 160

C. 161

D. 163

Answer: A,C

Question No: 87 – (Topic 2)

What will the following command produce on a website login page?

SELECT email, passwd, login_id, full_name FROM members

WHERE email = #39;someone@somehwere.com#39;; DROP TABLE members; -#39;

  1. Inserts the Error! Reference source not found. email address into the members table

  2. Retrieves the password for the first user in the members table

  3. Deletes the entire members table

  4. This command will not produce anything since the syntax is incorrect

Answer: C

Question No: 88 – (Topic 2)

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

  1. RIPE

  2. CVE

  3. IANA

  4. APIPA

Answer: B

Question No: 89 – (Topic 2)

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers. Bill protects the PDF documents with a password and sends them to their intended recipients. Why PDF passwords do not offer maximum protection?

  1. PDF passwords can easily be cracked by software brute force tools

  2. PDF passwords are not considered safe by Sarbanes-Oxley

  3. PDF passwords are converted to clear text when sent through E-mail

  4. When sent through E-mail, PDF passwords are stripped from the document completely

Answer: A

Question No: 90 – (Topic 2)

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so quickly?

  1. Networks using Active Directory never use SAM databases so the SAM database pulled was empty

  2. Passwords of 14 characters or less are broken up into two 7-character hashes

  3. The passwords that were cracked are local accounts on the Domain Controller

  4. A password Group Policy change takes at least 3 weeks to completely replicate throughout a network

Answer: B

100% Ensurepass Free Download!
Download Free Demo:EC0-479 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-479 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No